首页 > 最新文献

Proceedings of the 3rd International Conference on Graphics and Signal Processing最新文献

英文 中文
Performance Comparison of Different CNN models for Indian Road Dataset 不同CNN模型在印度道路数据集上的性能比较
Abhishek Mukhopadhyay, P. Biswas, Ayush Agarwal, Imon Mukherjee
Recent advancement in the field of computer vision and development of Deep Neural Network based object detection led researchers and industries to focus on autonomous vehicles. This paper aims to find how accurately previously proposed CNN architectures detect on-road obstacles in Indian road scenarios in the context of autonomous vehicle. We have compared three different convolution neural networks trained with COCO dataset for detecting autorickshaws in Indian road. We undertook statistical hypothesis testing to find effect of these three models, i.e. YOLOv3, Mask R-CNN, and RetinaNet on detection accuracy rate. While measuring accuracy, we have noted that detection accuracy rate of RetinaNet is significantly better than other two CNN architectures. Although there is no significant difference between other two networks in context of detection rate. The accuracy rate shows the performance of RetinaNet invariant to autorickshaws' color and shape, and different climatic and complex background scenarios.
计算机视觉领域的最新进展和基于深度神经网络的目标检测的发展使研究人员和行业关注自动驾驶汽车。本文旨在找出在自动驾驶汽车背景下,以前提出的CNN架构在印度道路场景中检测道路障碍物的准确性。我们比较了用COCO数据集训练的三种不同的卷积神经网络,用于检测印度道路上的机动车辆。我们对YOLOv3、Mask R-CNN、RetinaNet这三种模型对检测准确率的影响进行了统计假设检验。在测量精度时,我们注意到retanet的检测准确率明显优于其他两种CNN架构。尽管其他两种网络在检出率方面没有显著差异。准确率显示了retanet对机动三轮车颜色、形状、不同气候和复杂背景场景的不变性。
{"title":"Performance Comparison of Different CNN models for Indian Road Dataset","authors":"Abhishek Mukhopadhyay, P. Biswas, Ayush Agarwal, Imon Mukherjee","doi":"10.1145/3338472.3338480","DOIUrl":"https://doi.org/10.1145/3338472.3338480","url":null,"abstract":"Recent advancement in the field of computer vision and development of Deep Neural Network based object detection led researchers and industries to focus on autonomous vehicles. This paper aims to find how accurately previously proposed CNN architectures detect on-road obstacles in Indian road scenarios in the context of autonomous vehicle. We have compared three different convolution neural networks trained with COCO dataset for detecting autorickshaws in Indian road. We undertook statistical hypothesis testing to find effect of these three models, i.e. YOLOv3, Mask R-CNN, and RetinaNet on detection accuracy rate. While measuring accuracy, we have noted that detection accuracy rate of RetinaNet is significantly better than other two CNN architectures. Although there is no significant difference between other two networks in context of detection rate. The accuracy rate shows the performance of RetinaNet invariant to autorickshaws' color and shape, and different climatic and complex background scenarios.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117195052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Research on Secure Routing Technology Based on NDN for VANET 基于NDN的VANET安全路由技术研究
Xiaowei Gai
NDN (Named Data Networking) is a new information-centric future network architecture. This new network architecture uses a "named content" mechanism instead of a "named host" mechanism based on TCP/IP networks. The mechanism decouples the geographic location from the identity identifier, while the transport content object itself is attached with security-related metadata. Compared with the traditional IP address-centric TCP/IP network, the information-centric NDN network is more suitable for high-speed dynamic VANET network environment. Therefore, we propose a secure content routing scheme for NOLSR in mobile networks. Despite the introduction of security mechanisms in NDN, these security mechanisms cannot meet the security requirements in wireless networks. In order to establish a secure routing mechanism in wireless dynamic networks, this paper uses identity-based cryptography for key distribution and management, and introduces some new security mechanisms, such as forward security mechanisms to reduce the threat of key leakage. Interest flooding will cause broadcast storm in wireless network. NOLSR adopts MPR mechanism for interest flooding. In order to reduce overhead in wireless mobile networks, LFBL (listen first-forward last) is adopted in MPR. To prevent the selection of the attacker-controlled node as the MPR node and the selection of the self-serving node in the MPR node, the malicious node and the self-private node are selected by using the trust value and voting mechanism between the computing nodes. Finally, this paper analyses the security attributes of NOLSR scheme, verifies the feasibility of NOLSR scheme in detail, and compares the efficiency of this scheme with other related schemes.
NDN (Named Data Networking)是一种以信息为中心的新型未来网络架构。这种新的网络架构使用“命名内容”机制,而不是基于TCP/IP网络的“命名主机”机制。该机制将地理位置与标识符解耦,而传输内容对象本身则附加了与安全相关的元数据。与传统的以IP地址为中心的TCP/IP网络相比,以信息为中心的NDN网络更适合高速动态的VANET网络环境。因此,我们提出了一种针对移动网络中NOLSR的安全内容路由方案。尽管在NDN中引入了安全机制,但这些安全机制不能满足无线网络的安全需求。为了在无线动态网络中建立安全的路由机制,本文采用基于身份的加密技术进行密钥分发和管理,并引入了一些新的安全机制,如前向安全机制,以减少密钥泄露的威胁。兴趣泛滥会引起无线网络的广播风暴。NOLSR采用MPR机制进行利益淹没。为了减少无线移动网络的开销,MPR中采用了LFBL(先听后听)。为了避免MPR节点选择攻击者控制的节点和MPR节点中自服务节点的选择,利用计算节点之间的信任值和投票机制选择恶意节点和自私有节点。最后,分析了NOLSR方案的安全属性,详细验证了该方案的可行性,并与其他相关方案进行了效率比较。
{"title":"Research on Secure Routing Technology Based on NDN for VANET","authors":"Xiaowei Gai","doi":"10.1145/3338472.3338495","DOIUrl":"https://doi.org/10.1145/3338472.3338495","url":null,"abstract":"NDN (Named Data Networking) is a new information-centric future network architecture. This new network architecture uses a \"named content\" mechanism instead of a \"named host\" mechanism based on TCP/IP networks. The mechanism decouples the geographic location from the identity identifier, while the transport content object itself is attached with security-related metadata. Compared with the traditional IP address-centric TCP/IP network, the information-centric NDN network is more suitable for high-speed dynamic VANET network environment. Therefore, we propose a secure content routing scheme for NOLSR in mobile networks. Despite the introduction of security mechanisms in NDN, these security mechanisms cannot meet the security requirements in wireless networks. In order to establish a secure routing mechanism in wireless dynamic networks, this paper uses identity-based cryptography for key distribution and management, and introduces some new security mechanisms, such as forward security mechanisms to reduce the threat of key leakage. Interest flooding will cause broadcast storm in wireless network. NOLSR adopts MPR mechanism for interest flooding. In order to reduce overhead in wireless mobile networks, LFBL (listen first-forward last) is adopted in MPR. To prevent the selection of the attacker-controlled node as the MPR node and the selection of the self-serving node in the MPR node, the malicious node and the self-private node are selected by using the trust value and voting mechanism between the computing nodes. Finally, this paper analyses the security attributes of NOLSR scheme, verifies the feasibility of NOLSR scheme in detail, and compares the efficiency of this scheme with other related schemes.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115530622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Standardization of the Central Console in Police Vehicles 警车中控台的标准化
Piotr Łuka, A. Urban
The article was written in the framework of the project entitled "Development of Police vehicles classification depending on their purpose and standardization of the central console of vehicles in the scope of arrangement and installation of ICT system and control devices of special purpose signals" DOB-BIO7/04/02/2015 with the value of PLN 4 058 789, co-funded by the National Centre for Research and Development under the contest 7/2015.
这篇文章是在题为“根据警车用途分类的发展和车辆中央控制台标准化在安排和安装信息通信技术系统和特殊用途信号控制装置范围内”的项目框架内编写的,项目价值为PLN 4 058 789,由国家研究与发展中心在7/2015竞赛下共同资助。
{"title":"Standardization of the Central Console in Police Vehicles","authors":"Piotr Łuka, A. Urban","doi":"10.1145/3338472.3338494","DOIUrl":"https://doi.org/10.1145/3338472.3338494","url":null,"abstract":"The article was written in the framework of the project entitled \"Development of Police vehicles classification depending on their purpose and standardization of the central console of vehicles in the scope of arrangement and installation of ICT system and control devices of special purpose signals\" DOB-BIO7/04/02/2015 with the value of PLN 4 058 789, co-funded by the National Centre for Research and Development under the contest 7/2015.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124311609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Applying Modified SHA256 on Blockchain using Challenge Response and Off-chain Signatures Patterns 使用挑战响应和链下签名模式在区块链上应用改进的SHA256
Maria Rona L. Perez, B. Gerardo, R. Medina
This article has been removed from the ACM Digital Library because it was found to plagiarize an earlier work written by Eberhardt J., Tai S. (2017) On or Off the Blockchain? Insights on Off-Chaining Computation and Data. In: De Paoli F., Schulte S., Broch Johnsen E. (eds) Service-Oriented and Cloud Computing. ESOCC 2017. Lecture Notes in Computer Science, vol 10465. Springer, Cham https://link.springer.com/chapter/10.1007/978-3-319-67262-5_1 For further information, contact the ACM Director of Publications.
这篇文章已经从ACM数字图书馆中删除,因为它被发现抄袭了Eberhardt J., Tai S.(2017)的早期作品。关于非链计算和数据的见解。见:De Paoli F., Schulte S., Broch Johnsen E.(编)面向服务和云计算。ESOCC 2017。计算机科学课堂讲稿,卷10465。施普林格,Cham https://link.springer.com/chapter/10.1007/978-3-319-67262-5_1欲了解更多信息,请联系ACM出版主任。
{"title":"Applying Modified SHA256 on Blockchain using Challenge Response and Off-chain Signatures Patterns","authors":"Maria Rona L. Perez, B. Gerardo, R. Medina","doi":"10.1145/3338472.3338486","DOIUrl":"https://doi.org/10.1145/3338472.3338486","url":null,"abstract":"This article has been removed from the ACM Digital Library because it was found to plagiarize an earlier work written by Eberhardt J., Tai S. (2017) On or Off the Blockchain? Insights on Off-Chaining Computation and Data. In: De Paoli F., Schulte S., Broch Johnsen E. (eds) Service-Oriented and Cloud Computing. ESOCC 2017. Lecture Notes in Computer Science, vol 10465. Springer, Cham https://link.springer.com/chapter/10.1007/978-3-319-67262-5_1 For further information, contact the ACM Director of Publications.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114875904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Light Field Image Encryption Based on Pixel Substitution and Double Random Phase Encoding 基于像素替换和双随机相位编码的光场图像加密
Kangkang Wei, Wenying Wen
In this paper, a light field image (LFI) encryption scheme based on pixel substitution and double random phase encoding (DRPE) is presented. The LFI includes the direction and intensity information of the light in the propagation process. Firstly, we employ an angular domain plane to represent the multi-view image of the LFI. Furthermore, pixel substitution processing based on rows and columns for a single view LFI. Finally, by the Fourier transform based on DRPE to obtain a encrypted image. Experimental results show that proposed scheme can be reliable and has a better immunity to noise and higher execution efficiency.
提出了一种基于像素替换和双随机相位编码的光场图像加密方案。LFI包含光在传播过程中的方向和强度信息。首先,我们使用一个角域平面来表示LFI的多视图图像。此外,对单个视图LFI进行了基于行和列的像素替换处理。最后,通过基于DRPE的傅里叶变换得到加密后的图像。实验结果表明,该方案可靠,具有较好的抗噪声能力和较高的执行效率。
{"title":"Light Field Image Encryption Based on Pixel Substitution and Double Random Phase Encoding","authors":"Kangkang Wei, Wenying Wen","doi":"10.1145/3338472.3338477","DOIUrl":"https://doi.org/10.1145/3338472.3338477","url":null,"abstract":"In this paper, a light field image (LFI) encryption scheme based on pixel substitution and double random phase encoding (DRPE) is presented. The LFI includes the direction and intensity information of the light in the propagation process. Firstly, we employ an angular domain plane to represent the multi-view image of the LFI. Furthermore, pixel substitution processing based on rows and columns for a single view LFI. Finally, by the Fourier transform based on DRPE to obtain a encrypted image. Experimental results show that proposed scheme can be reliable and has a better immunity to noise and higher execution efficiency.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129197206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design and Visualization of Guided GAN on MNIST dataset MNIST数据集上引导GAN的设计与可视化
Haohe Liu, Siqi Yao, Yulin Wang
In this paper, we propose a hybrid model aiming to map input noise vector to the label of the generated image by Generative Adversarial Network (GAN). This model mainly consists of a pre-trained Deep Convolution Generative Adversarial Network (DCGAN) and a classifier. By using the model, we visualize the distribution of two-dimensional input noise leading to specific type of generated image after each training epoch of GAN. The visualization reveals the distribution feature of the input noise vectors and the performance of the generator. With this feature, we try to build a Guided Generator which can produce a fake image which we exactly need. Two methods are proposed to build the Guided Generator. One is the most significant noise (MSN) method, and another is utilizing labeled noise. MSN method can generate images precisely but with less variations. In contrast, labeled noise method can have more variations but slightly less stable.
本文提出了一种混合模型,旨在通过生成对抗网络(GAN)将输入噪声向量映射到生成图像的标签。该模型主要由预训练的深度卷积生成对抗网络(DCGAN)和分类器组成。通过使用该模型,我们可视化了在GAN的每个训练历元后导致特定类型生成图像的二维输入噪声的分布。可视化显示了输入噪声矢量的分布特征和发生器的性能。有了这个功能,我们试图建立一个引导生成器,它可以产生一个我们完全需要的假图像。提出了两种方法来构建引导发生器。一种是最显著噪声(MSN)方法,另一种是利用标记噪声。MSN方法可以精确地生成图像,但变化较小。相比之下,标记噪声法可以有更多的变化,但稳定性略差。
{"title":"Design and Visualization of Guided GAN on MNIST dataset","authors":"Haohe Liu, Siqi Yao, Yulin Wang","doi":"10.1145/3338472.3338489","DOIUrl":"https://doi.org/10.1145/3338472.3338489","url":null,"abstract":"In this paper, we propose a hybrid model aiming to map input noise vector to the label of the generated image by Generative Adversarial Network (GAN). This model mainly consists of a pre-trained Deep Convolution Generative Adversarial Network (DCGAN) and a classifier. By using the model, we visualize the distribution of two-dimensional input noise leading to specific type of generated image after each training epoch of GAN. The visualization reveals the distribution feature of the input noise vectors and the performance of the generator. With this feature, we try to build a Guided Generator which can produce a fake image which we exactly need. Two methods are proposed to build the Guided Generator. One is the most significant noise (MSN) method, and another is utilizing labeled noise. MSN method can generate images precisely but with less variations. In contrast, labeled noise method can have more variations but slightly less stable.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134636584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Framework for Hiding Information in Audio Sub-signals by Using Singular Spectrum Analysis with Psychoacoustic Model 基于心理声学模型奇异谱分析的音频子信号信息隐藏框架
Ratthamontree Burimas, Tidanat Kumpuak, Mongkonchai Intarauksorn, Kasorn Galajit, P. Aimmanee, Jessada Karnjana
This paper proposes a method for hiding information in audio signals by using singular spectrum analysis (SSA) with a psychoacoustic model to enhance the sound quality of a watermarked signal from our previous work. In this framework, an original signal is decomposed into many sub-signals by applying the combination of the SSA-based method and the psychoacoustic model. The sub-signals to be embedded are chosen using signal analysis based on human perception. The watermark bits are embedded into selected sub-signals by modifying some parts of their singular spectra according to an embedding rule. Then, the accuracy of extracted watermark bits and the sound quality of the watermarked signal, compared with that of the original one, are used to verify the performance of our framework. The experimental results show that the proposed framework satisfies the evaluation criteria in terms of inaudibility and robustness. However, it has a significant trade-off between them.
本文提出了一种基于心理声学模型的奇异频谱分析(SSA)方法来隐藏音频信号中的信息,以提高水印信号的音质。在该框架中,将基于ssa的方法与心理声学模型相结合,将原始信号分解成许多子信号。利用基于人类感知的信号分析选择要嵌入的子信号。根据嵌入规则修改子信号奇异谱的一部分,将水印位嵌入到选定的子信号中。然后,将提取的水印位的精度和水印信号的音质与原始信号的音质进行比较,验证该框架的性能。实验结果表明,该框架在不听性和鲁棒性方面满足评价标准。然而,它们之间有一个重要的权衡。
{"title":"Framework for Hiding Information in Audio Sub-signals by Using Singular Spectrum Analysis with Psychoacoustic Model","authors":"Ratthamontree Burimas, Tidanat Kumpuak, Mongkonchai Intarauksorn, Kasorn Galajit, P. Aimmanee, Jessada Karnjana","doi":"10.1145/3338472.3338488","DOIUrl":"https://doi.org/10.1145/3338472.3338488","url":null,"abstract":"This paper proposes a method for hiding information in audio signals by using singular spectrum analysis (SSA) with a psychoacoustic model to enhance the sound quality of a watermarked signal from our previous work. In this framework, an original signal is decomposed into many sub-signals by applying the combination of the SSA-based method and the psychoacoustic model. The sub-signals to be embedded are chosen using signal analysis based on human perception. The watermark bits are embedded into selected sub-signals by modifying some parts of their singular spectra according to an embedding rule. Then, the accuracy of extracted watermark bits and the sound quality of the watermarked signal, compared with that of the original one, are used to verify the performance of our framework. The experimental results show that the proposed framework satisfies the evaluation criteria in terms of inaudibility and robustness. However, it has a significant trade-off between them.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"PP 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126406963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Image Memorability Prediction 图像记忆预测研究综述
Jie Liu, Dou-Dou Wang, Yan Wang, Hao Zhang
With the development of information technology and networks, images can be seen everywhere in life. When people browse magazines and the Internet, they come into contact with thousands of images, some of which remain in people's memories, while others are forgotten. Isola et al. first proposed the concept of image memorability and proved that image memorability is an intrinsic and stable attribute of images and can be shared among different viewers. Image memorability prediction has important research value and can be applied to education, advertising and other fields. In order to promote the research of image memorability prediction, the main theories and methods are summarized. Based on the comparison and analysis of the literatures related to image memorability prediction, this paper firstly reviews the proposal and quantification of the concept of image memorability. The features that affect the image memorability and the methods for extracting features are analyzed. The prediction of predictive image memorability is introduced in detail. The prediction is constructed based on Support Vector Machine and Convolution Neural Network and using different features that affect image memorability. Finally, the future work of image memorability is summarized and forecasted.
随着信息技术和网络的发展,图像在生活中随处可见。当人们浏览杂志和互联网时,他们接触到成千上万的图像,其中一些留在人们的记忆中,而另一些则被遗忘了。Isola等人首先提出了图像可记忆性的概念,并证明图像可记忆性是图像固有的、稳定的属性,可以在不同的观看者之间共享。图像记忆预测具有重要的研究价值,可应用于教育、广告等领域。为了促进图像记忆预测的研究,总结了目前图像记忆预测的主要理论和方法。在对图像可记忆性预测相关文献进行比较分析的基础上,本文首先回顾了图像可记忆性概念的提出和定量化。分析了影响图像记忆的特征及其提取方法。详细介绍了预测图像记忆性的预测方法。该预测基于支持向量机和卷积神经网络,并利用影响图像记忆的不同特征。最后,对图像记忆今后的工作进行了总结和展望。
{"title":"Review of Image Memorability Prediction","authors":"Jie Liu, Dou-Dou Wang, Yan Wang, Hao Zhang","doi":"10.1145/3338472.3338479","DOIUrl":"https://doi.org/10.1145/3338472.3338479","url":null,"abstract":"With the development of information technology and networks, images can be seen everywhere in life. When people browse magazines and the Internet, they come into contact with thousands of images, some of which remain in people's memories, while others are forgotten. Isola et al. first proposed the concept of image memorability and proved that image memorability is an intrinsic and stable attribute of images and can be shared among different viewers. Image memorability prediction has important research value and can be applied to education, advertising and other fields. In order to promote the research of image memorability prediction, the main theories and methods are summarized. Based on the comparison and analysis of the literatures related to image memorability prediction, this paper firstly reviews the proposal and quantification of the concept of image memorability. The features that affect the image memorability and the methods for extracting features are analyzed. The prediction of predictive image memorability is introduced in detail. The prediction is constructed based on Support Vector Machine and Convolution Neural Network and using different features that affect image memorability. Finally, the future work of image memorability is summarized and forecasted.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122227248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey of Distance Metrics in Clustering Data Mining Techniques 聚类数据挖掘技术中距离度量研究综述
Marina Adriana Mercioni, S. Holban
Lately, due to the increasing size of databases, several aspects have been studied in detail, such as grouping, searching for the closest neighbor and other identification methods. It has been found that in the multidimensional space, the concept of distance does not offer high performance. In this paper, we study the effect of different types of distances on the group to see the similarities between objects. Among these distances we mention two distances: the Euclidean distance and Manhattan distance, implemented in a system developed to identify the architectural styles of the buildings. The aim of this paper is using cluster analysis to identify distance metrics impact in detection of architectural styles using Data Mining techniques.
近年来,由于数据库的规模越来越大,人们对分组、搜索最近邻等识别方法进行了详细的研究。研究发现,在多维空间中,距离的概念并不能提供高性能。在本文中,我们研究了不同类型的距离对群体的影响,以查看对象之间的相似性。在这些距离中,我们提到了两个距离:欧几里得距离和曼哈顿距离,这两个距离是在一个系统中实现的,用于识别建筑物的建筑风格。本文的目的是使用聚类分析来识别距离度量对使用数据挖掘技术检测建筑风格的影响。
{"title":"A Survey of Distance Metrics in Clustering Data Mining Techniques","authors":"Marina Adriana Mercioni, S. Holban","doi":"10.1145/3338472.3338490","DOIUrl":"https://doi.org/10.1145/3338472.3338490","url":null,"abstract":"Lately, due to the increasing size of databases, several aspects have been studied in detail, such as grouping, searching for the closest neighbor and other identification methods. It has been found that in the multidimensional space, the concept of distance does not offer high performance. In this paper, we study the effect of different types of distances on the group to see the similarities between objects. Among these distances we mention two distances: the Euclidean distance and Manhattan distance, implemented in a system developed to identify the architectural styles of the buildings. The aim of this paper is using cluster analysis to identify distance metrics impact in detection of architectural styles using Data Mining techniques.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Analyzing Eye Gaze of Users with Learning Disability 分析有学习障碍的用户的目光
K. Saluja, Jeevithashree Dv, Somnath Arjun, P. Biswas, Teena Paul
This paper investigates eye gaze movements of children with different reading abilities due to learning disability. We analyzed eye gaze fixations using cluster analysis and velocity-based fixation classification algorithms. We used a non-invasive, screen mounted, low-cost eye tracker to collect data from 30 participants including students with learning disabilities. We analyzed raw gaze points, fixations and saccades, and noted that the density of gaze points around fixation. Total number of fixations and regressions (backward gaze movement) were statistically significantly correlated to the reading ability of students. We concluded that by analyzing different eye movements for a representative reading task, we can detect early signs of learning disabilities such as dyslexia.
研究了不同学习障碍儿童的眼球注视运动。我们使用聚类分析和基于速度的注视分类算法来分析眼睛注视。我们使用了一种非侵入式、安装在屏幕上的低成本眼动仪来收集30名参与者的数据,其中包括有学习障碍的学生。我们分析了原始注视点、注视点和扫视,并注意到注视点周围的注视点密度。注视和回归的总数(向后凝视运动)与学生的阅读能力有统计学显著相关。我们的结论是,通过分析具有代表性的阅读任务中不同的眼球运动,我们可以发现学习障碍的早期迹象,如阅读障碍。
{"title":"Analyzing Eye Gaze of Users with Learning Disability","authors":"K. Saluja, Jeevithashree Dv, Somnath Arjun, P. Biswas, Teena Paul","doi":"10.1145/3338472.3338481","DOIUrl":"https://doi.org/10.1145/3338472.3338481","url":null,"abstract":"This paper investigates eye gaze movements of children with different reading abilities due to learning disability. We analyzed eye gaze fixations using cluster analysis and velocity-based fixation classification algorithms. We used a non-invasive, screen mounted, low-cost eye tracker to collect data from 30 participants including students with learning disabilities. We analyzed raw gaze points, fixations and saccades, and noted that the density of gaze points around fixation. Total number of fixations and regressions (backward gaze movement) were statistically significantly correlated to the reading ability of students. We concluded that by analyzing different eye movements for a representative reading task, we can detect early signs of learning disabilities such as dyslexia.","PeriodicalId":142573,"journal":{"name":"Proceedings of the 3rd International Conference on Graphics and Signal Processing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114627376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 3rd International Conference on Graphics and Signal Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1